ExploitSpearphishingEncryptionPasswordSafe ToolWhalephishingMalwareScreenlockpolicyCompromiseMulti-factorauthentication(MFA)WormDarkwebAwarenessTrainingZero-dayVirusBreachIntrusionExtorsionSoftwareupdates12CharacterPasswordsPhishingTrainingRansomwarePersonallyidentifiableinformation(PII)VulnerabilityExploitSpearphishingEncryptionPasswordSafe ToolWhalephishingMalwareScreenlockpolicyCompromiseMulti-factorauthentication(MFA)WormDarkwebAwarenessTrainingZero-dayVirusBreachIntrusionExtorsionSoftwareupdates12CharacterPasswordsPhishingTrainingRansomwarePersonallyidentifiableinformation(PII)Vulnerability

Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Exploit
  2. Spear phishing
  3. Encryption
  4. Password Safe Tool
  5. Whale phishing
  6. Malware
  7. Screen lock policy
  8. Compromise
  9. Multi-factor authentication (MFA)
  10. Worm
  11. Dark web
  12. Awareness Training
  13. Zero-day
  14. Virus
  15. Breach
  16. Intrusion
  17. Extorsion
  18. Software updates
  19. 12 Character Passwords
  20. Phishing
  21. Training
  22. Ransomware
  23. Personally identifiable information (PII)
  24. Vulnerability